Search

Your search keyword '"Vulnerability (computing)"' showing total 452 results

Search Constraints

Start Over You searched for: Descriptor "Vulnerability (computing)" Remove constraint Descriptor: "Vulnerability (computing)" Publisher acm Remove constraint Publisher: acm
452 results on '"Vulnerability (computing)"'

Search Results

1. Secure aggregation for federated learning in flower

2. Analysis of E-Mobility-based Threats to Power Grid Resilience

3. Chunk-Level Password Guessing: Towards Modeling Refined Password Composition Representations

4. Facilitating Vulnerability Assessment through PoC Migration

5. Sealed Storage for Low-Cost IoT Devices: an Approach Using SRAM PUFs and Post-Quantum Cryptography

6. Who you gonna call?

7. Towards Anomaly-resistant Graph Neural Networks via Reinforcement Learning

8. Adversarial Reprogramming of Pretrained Neural Networks for Fraud Detection

9. A Deeper Look into RowHammer’s Sensitivities: Experimental Analysis of Real DRAM Chips and Implications on Future Attacks and Defenses

10. Uncovering In-DRAM RowHammer Protection Mechanisms:A New Methodology, Custom RowHammer Patterns, and Implications

11. Validation of Side-Channel Models via Observation Refinement

12. The Curse of Correlations for Robust Fingerprinting of Relational Databases

13. GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks

14. Hierarchical Quantitative Assessment Method of Network Security Threat Situation

15. The Idiosyncratic Effects of Adversarial Training on Bias in Personalized Recommendation Learning

16. A Recommender System for Tracking Vulnerabilities

17. OVANA: An Approach to Analyze and Improve the Information Quality of Vulnerability Databases

18. Indirect Invisible Poisoning Attacks on Domain Adaptation

19. A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions

20. Through the Spyglass: Towards IoT Companion App Man-in-the-Middle Attacks

21. Toward Tracing the Source of Web Attacks Targeted at Web Applications

22. A Vulnerability of Dynamic Network Address Translation to Denial-of-Service Attacks

23. Adversarial Text Generation for Personality Privacy Protection

24. Hedging Against Sore Loser Attacks in Cross-Chain Transactions

25. RAProducer: efficiently diagnose and reproduce data race bugs for binaries via trace analysis

26. Lighter and Better: Low-Rank Decomposed Self-Attention Networks for Next-Item Recommendation

27. Empirical evaluation of smart contract testing: what is the best choice?

28. EvolMusic

29. Simulating a logistics enterprise using an asymmetrical wargame simulation with soar reinforcement learning and coevolutionary algorithms

30. Privacy Preservation Techniques for Sequential Data Releasing

31. A Privacy Preservation Model for RFID Data-Collections is Highly Secure and More Efficient than LKC-Privacy

32. Spearphone

33. Message sieving to mitigate smart gridlock attacks in V2V

34. On the Vulnerability of Hardware Masking in Practical Implementations

35. Understanding Credibility of Adversarial Examples against Smart Grid

36. Temporal Vulnerability Assessment for Convex Hull Pricing

37. Dealing with (some of) the fallout from meltdown

38. Regulating Storage Overhead in Existing PoW-based Blockchains

39. Vulnerability Sample Analysis Based on Reverse Debugging

40. Look Before You Leap: Secure Connection Bootstrapping for 5G Networks to Defend Against Fake Base-Stations

41. Bypassing Push-based Second Factor and Passwordless Authentication with Human-Indistinguishable Notifications

42. Risk Assessments of Social Engineering Attacks and Set Controls in an Online Education Environment

43. Research on Complex Characteristics and Vulnerability of Power Communication Network

44. Critical components identification for cyber-physical power systems considering time-varying operational states

45. Demonstrating User Authentication via Electrical Muscle Stimulation

46. User Authentication via Electrical Muscle Stimulation

47. OBFUS

48. Membership Inference Attacks and Defenses in Classification Models

49. An Investigation of Identity-Account Inconsistency in Single Sign-On

50. An empirical study of thermal attacks on edge platforms

Catalog

Books, media, physical & digital resources